3.4 Asymmetric Encryption

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are two characteristics of ECC?

- Uses a finite set of values within an algebraic field - Asymmetric encryption

How many keys are used with asymmetric or public key cryptography?

1

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography

ECDH Elliptic curve Diffie-Hellman

Which form of asymmetric cryptography is based upon Diffie-Hellman?

El Gamal

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to verify the integrity of the transmission?

Sender's public key

Which of the following algorithms are used in asymmetric encryption?

- RSA - Diffie- Hellman

Exist only for the lifetime of a specific communication

Ephemeral Keys

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

The strength of a cryptosystem is dependent upon which of the following?

Secrecy of the key

Can be reused by multiple communication sessions

Static Keys

Which of the following generates the key pair used in asymmetric cryptography?

A Cryptographic Service Provider (CSP)

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RCS or any other symmetric cryptography solution?

Diffie-Hellman

Uses no deterministic algorithm when generating public keys

Perfect forward secrecy

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key


Ensembles d'études connexes

chapter 10, B&E 201, adaptive test prep

View Set

Chapter 10 LAN security concepts

View Set

Chapter 13: Server Management and Monitoring

View Set

Neuro assess, TIA, stroke, ICP, NCLEX

View Set